Activity
From 10/12/2013 to 11/10/2013
11/10/2013
- 12:50 PM Feature #6748 (Resolved): Return bucket name in response header
- Make a configurable setting where you can enable the RGW to return the bucket name of the bucket the request came for...
- 12:49 PM Feature #6747 (Fix Under Review): PowerDNS backend for RGW bucket directing
- See this blueprint: http://wiki.ceph.com/01Planning/02Blueprints/Firefly/PowerDNS_backend_for_RGW
11/08/2013
- 03:33 PM Bug #6611: RGW: Using underscores when setting headers returns 403
- Did some investigation. The problem originates in apache at ap_create_environment() that normalizes all the env vars ...
- 03:30 PM Bug #6152: New S3 auth code fails when using response-* query string params to override response ...
- This is still waiting for merge (sent a pull request a week ago).
- 02:27 PM Bug #6672 (Resolved): normal PUT object requests got 405 sometimes
- Added signed-off by (with approval of author) and merged into dumpling at commit:372f62717c56d9ab883ae2942e13d6d8d37c...
11/07/2013
- 01:03 PM Bug #6733: rgw readwrite test fails on next branch
- it seems to be some kind of miscommunication between radosgw and apache, most likely apache is going down
- 10:41 AM Bug #6733 (Closed): rgw readwrite test fails on next branch
- logs: ubuntu@teuthology:/a/teuthology-2013-11-05_23:01:20-rgw-next-testing-basic-plana/86307...
- 09:41 AM Fix #6615 (Resolved): radosgw: data log list admin api does not include any markers
- backported, commit:6917b02530103b8c86ed75592da33144b0dea168
- 09:40 AM Bug #6604 (Resolved): radosgw-agent: opstate tracking error
- backported, merge commit:6917b02530103b8c86ed75592da33144b0dea168
- 09:35 AM Fix #6616 (Resolved): radosgw: system users are not handled well by read_policy()
- Was backported, commit:f1fa8116d441924d44c99624829f3daa090c821c
- 09:15 AM Feature #6678 (Resolved): rgw: reject writes to secondary zones
- merged, commit:84fb1bf3eefe88c0f5f15034d69c171e6531bf76.
11/06/2013
- 09:32 AM Documentation #5165 (Resolved): rgw: multisite: regions and global namespace documentation
- Doc branch merged. Document is now public.
- 09:31 AM Documentation #5166 (Resolved): rgw: dr: async repl and DR documentation
- Doc branch merged and made public.
11/05/2013
- 06:36 PM Feature #6677 (Fix Under Review): rgw: add compatibility for MultipartUpload
- 06:14 PM Feature #6678 (Fix Under Review): rgw: reject writes to secondary zones
- 05:48 PM Bug #6713: rgw master nosetests failure.
- I'll keep an eye on these and close if they stay away.
- 12:25 PM Bug #6152 (Pending Backport): New S3 auth code fails when using response-* query string params to...
- 12:25 PM Bug #6152: New S3 auth code fails when using response-* query string params to override response ...
- I sent a pull request a few days ago, so this should be in the next dumpling release.
11/04/2013
- 08:00 PM Bug #6710 (Fix Under Review): radosgw init script does not exit 1 and tell the user if the hostna...
- 12:40 PM Bug #6672 (Pending Backport): normal PUT object requests got 405 sometimes
- 12:28 PM Bug #6709: rgw upgrade test fails during readwrite
- It's hard to determine what exactly happened, as we don't turn on the gateway logging anymore. But generally it looks...
- 10:37 AM Bug #6713 (Can't reproduce): rgw master nosetests failure.
- Using the following yaml files:...
11/03/2013
- 05:25 AM Bug #6710: radosgw init script does not exit 1 and tell the user if the hostname does not match
- Went a bit beyond the scope, saw that there were more improvements that could be made.
https://github.com/ceph/ceph/... - 04:14 AM Bug #6710: radosgw init script does not exit 1 and tell the user if the hostname does not match
- I will submit a pull request for this.
- 04:14 AM Bug #6710 (Resolved): radosgw init script does not exit 1 and tell the user if the hostname does ...
- If the hostname of the machine and the host configured for radosgw in ceph.conf, we exit 0 without telling the user a...
11/02/2013
11/01/2013
- 07:06 PM Fix #6615: radosgw: data log list admin api does not include any markers
- backport: https://github.com/ceph/ceph/pull/804
- 07:06 PM Fix #6616: radosgw: system users are not handled well by read_policy()
- backport: https://github.com/ceph/ceph/pull/804
- 07:06 PM Bug #6604: radosgw-agent: opstate tracking error
- https://github.com/ceph/ceph/pull/805
- 06:33 PM Bug #6694 (Duplicate): radosgw upstart script doesn't provide the -n parameter
- The name is determined by looking for client sections in ceph.conf that have 'host' matching the machine name. You ha...
- 01:53 PM Bug #6706 (Resolved): radosgw init script and hostname variations
- https://github.com/ceph/ceph/pull/801
- 01:30 PM Bug #6706 (Resolved): radosgw init script and hostname variations
- Relevant snippet:...
10/31/2013
- 02:55 PM Bug #6696 (Can't reproduce): Upgrade rgw failure in nightly tests. (/home/ubuntu/cephtest/s3-test...
- Suite tests using the following sets of yaml files:...
- 12:18 PM Bug #6694 (Duplicate): radosgw upstart script doesn't provide the -n parameter
- I'm using the Ceph Chef Cookbook to create and manage the configuration of a new Ceph 0.67.4 cluster on Ubuntu 12.10,...
- 11:04 AM Bug #5843: swift api: x-container-meta-{key} should not be allowed on an object
- It came from a customer, after discussions it is not causing any issue at all. We can leave it how it is.
10/30/2013
- 07:29 PM Bug #6672: normal PUT object requests got 405 sometimes
- Send the pull request against the 'next' branch at https://github.com/ceph/ceph/pull/795
- 04:56 PM Bug #5374 (Resolved): Avoid relying on keystone's admin token
- Merged, commit:b20d1bf33bdf6ed25ef9bb37afc3890282ece6d4
10/29/2013
- 08:42 PM Bug #6672: normal PUT object requests got 405 sometimes
- Updated with a new commit. Please help review it at https://github.com/ceph/ceph/pull/783
- 09:30 AM Bug #6672 (Fix Under Review): normal PUT object requests got 405 sometimes
- 08:00 AM Bug #6672: normal PUT object requests got 405 sometimes
- Thanks, the initialization code is indeed not safe. See my comment in the pull request.
- 04:57 AM Bug #6672: normal PUT object requests got 405 sometimes
- A quick fix is to set initialized to true after populating table in hex_to_num().
Please help review the fix at: h... - 04:53 AM Bug #6672 (Resolved): normal PUT object requests got 405 sometimes
- Under load testing, normal PUT object requests got 405 sometimes. The root cause is that there is a defect in hex_to_...
- 03:49 PM Feature #6678 (Resolved): rgw: reject writes to secondary zones
- Non-master zones are intended to be read-only. For disaster recovery, it may be useful to expose a secondary zone as ...
- 02:37 PM Feature #6677 (Resolved): rgw: add compatibility for MultipartUpload
- The AWS-PHP-SDK used MultipartUpload instead of CompleteMultipartUpload.
https://github.com/aws/aws-sdk-php/issues... - 12:45 PM Bug #6152: New S3 auth code fails when using response-* query string params to override response ...
- This is still broken on 0.67.4. Please consider backporting the fix (7a7361d7) to Dumpling.
10/28/2013
- 04:06 PM Bug #6621 (Resolved): quota: the max-size and max-objects value when zero
- 01:54 PM Bug #6621: quota: the max-size and max-objects value when zero
- There was an actual issue with setting negative values, so moved that back into the bug tracker. A fix was pushed to ...
- 12:00 PM Bug #6621: quota: the max-size and max-objects value when zero
- ok got it, if its by design, i think we should add this to the radosgw-admin help page saying that we allow max size ...
- 11:53 AM Bug #6621: quota: the max-size and max-objects value when zero
- Oh, I thought the problem was the other way around (that it wasn't accepting 0 or negative numbers). That's by design...
10/25/2013
- 01:25 PM Bug #6604 (Pending Backport): radosgw-agent: opstate tracking error
- 01:11 PM Feature #5170: RGW: Object restriping tool to fix large objects from argonaut.
- 01:11 PM Feature #4466 (Resolved): Quotas per bucket - synchronous
10/24/2013
- 04:44 PM Bug #6621: quota: the max-size and max-objects value when zero
- same applies to max-objects as well...
- 09:49 AM Fix #6616: radosgw: system users are not handled well by read_policy()
- https://github.com/ceph/ceph/pull/763
- 09:49 AM Fix #6615 (Fix Under Review): radosgw: data log list admin api does not include any markers
- https://github.com/ceph/ceph/pull/763
- 09:49 AM Bug #6604 (Fix Under Review): radosgw-agent: opstate tracking error
- https://github.com/ceph/ceph/pull/763
10/23/2013
- 05:19 PM Bug #6621 (Resolved): quota: the max-size and max-objects value when zero
- ceph version: 0.71-249-g31a9492 (31a94922a9ada132bea06be308484ead84e4d879)
while setting quota, the max-size field... - 10:04 AM Fix #6616 (Resolved): radosgw: system users are not handled well by read_policy()
- System users should be able to read suspended buckets and get 404 for deleted buckets instead of 403.
- 10:02 AM Fix #6615 (Resolved): radosgw: data log list admin api does not include any markers
- The last marker of the log entries fetched is needed to determine the position in the log. Previously the radosgw-age...
10/22/2013
- 02:06 PM Bug #6611 (Won't Fix): RGW: Using underscores when setting headers returns 403
- When setting headers that contain an underscore rgw returns a 403
In this example the header set was {'x-amz-meta... - 12:27 PM Bug #6606 (Resolved): rgw: swift COPY is broken
- Merged fix in commit:5cf31bf9e7a0a031fa853274dfd3ef376b27db56
- 10:46 AM Bug #6606 (Fix Under Review): rgw: swift COPY is broken
- 08:54 AM Bug #5374: Avoid relying on keystone's admin token
- Mainly needs to be brought up to date with current code base.
- 02:07 AM Bug #5374: Avoid relying on keystone's admin token
- What is missing to close this issue?
10/21/2013
- 02:15 PM Bug #6606 (Resolved): rgw: swift COPY is broken
- getting 404 for all COPY requests.
- 01:51 PM Bug #5302 (Can't reproduce): rest-bench breaks with XmlParseFailure
- 01:50 PM Bug #5323 (Resolved): trim data log lists dates as optional, enforced as required in the current ...
- 01:47 PM Bug #5843: swift api: x-container-meta-{key} should not be allowed on an object
- is this causing actual problems? it may be easier to leave it how it is.
- 01:44 PM Bug #6159 (Won't Fix): syncing an existing user causes an error
- 01:39 PM Bug #6449 (Rejected): Initiating multipart upload fails with no Content-Length header being set
- 01:39 PM Bug #6449: Initiating multipart upload fails with no Content-Length header being set
- This should work with the modified fastcgi module. The error is being sent directly from apache, as the vanilla modul...
- 10:01 AM Bug #6604 (Resolved): radosgw-agent: opstate tracking error
- Sometimes it seems the wrong opstate id is requested or something else about the request is wrong, so the agent sees ...
10/18/2013
10/17/2013
- 09:11 PM Bug #6475 (Resolved): rgw: Log directory should not be created by the init script
- awesome, merged it in. thanks!
- 09:02 PM Bug #6475: rgw: Log directory should not be created by the init script
- Debian looks good.
- 08:28 PM Bug #6475: rgw: Log directory should not be created by the init script
- I've confirmed that the rpm fix is correct with one change:
diff --git a/ceph.spec.in b/ceph.spec.in
index d6cc63... - 10:24 AM Bug #6571: apache2 errors in nightly
- 08:50 AM Feature #3454: Support temp URLs for Swift API
- Bump .. would really love to see this feature in there.
We are deploying Cloud Foundry v2 into Openstack, and want t...
10/16/2013
- 10:33 AM Bug #6571 (Resolved): apache2 errors in nightly
- this looks suspicious:...
- 01:19 AM Bug #6152: New S3 auth code fails when using response-* query string params to override response ...
- That commit has nothing to do with this issue ... this commit is from Februrary and related to duplicate content type...
10/15/2013
- 06:07 PM Documentation #6566: Improved documentation of common RADOS GW procedures
- I should have added that the text above is actually not from myself, but this is feedback from a production user.
- 06:03 PM Documentation #6566 (New): Improved documentation of common RADOS GW procedures
- I have executed the Rados GW procedures as documented. I have successfully connected to the S3 interface, so I know t...
- 05:12 PM Bug #5716 (Resolved): radosgw-admin: does not validate pool name when creating region
- Fixed, commit:c7acc2aee2f4aef19386ede46b4562b6552a3955
- 03:35 PM Bug #6449: Initiating multipart upload fails with no Content-Length header being set
- Hmm, looking at it now, we don't test for content length existence as the request itself doesn't have any input data....
- 03:04 PM Bug #6553 (Resolved): rgw: authenticated users group permissions not working
- 12:28 PM Bug #6553 (Fix Under Review): rgw: authenticated users group permissions not working
- 09:38 AM Bug #6553 (Resolved): rgw: authenticated users group permissions not working
- 03:03 PM Bug #6334 (Resolved): RGW admin socket doesn't appear to exist by default
- 02:35 PM Bug #6334 (Fix Under Review): RGW admin socket doesn't appear to exist by default
- 02:40 PM Bug #5245 (Can't reproduce): Frequent 500s from radosgw
- 02:36 PM Bug #6134 (Resolved): RGW returns an error on set_worker_bound if a zone's log_pool doesn't alrea...
- 02:36 PM Bug #6134: RGW returns an error on set_worker_bound if a zone's log_pool doesn't already exist
- Fixed, commit:4216eac0f59af60f60d4ce909b9ace87a7b64ccc
- 02:27 PM Bug #6475 (Fix Under Review): rgw: Log directory should not be created by the init script
- https://github.com/ceph/ceph/pull/722
- 02:27 PM Bug #6208 (Can't reproduce): rgw: md5 checksum failed on readwrite during upgrade-next tests
- 01:54 PM Bug #6505 (Resolved): ceph-deploy osd activate may sit undefinatly (centos)
- Fixed by setting a global timeout of 300 seconds for all remote connections.
Merged into ceph-deploy master br... - 12:33 PM Bug #6554 (Resolved): rgw: default log is too verbose
- 12:28 PM Bug #6554 (Fix Under Review): rgw: default log is too verbose
- 10:23 AM Bug #6554 (Resolved): rgw: default log is too verbose
10/14/2013
- 12:34 PM Bug #6462 (Resolved): Cannot update object HTTP headers using swift API
- Done, commit:f2645e1c6d7383a0ace3b239f4304e353249c4bb. Cherry-picked into dumpling.
Also available in: Atom